Information System Security

Assignment

Information System Security

  • Question 1

0 out of 1 points

In Biometric Authentication, overly exact match will cause more secure authentication.

  • Question 2

1 out of 1 points

System performs a N:N comparison against a biometric DB in attempt to establish the identity of an unknown individual.

  • Question 3

1 out of 1 points

Which option is not related to voice recognamtion?


  • Question 4

1 out of 1 points

In biometric functionality, Which step is before Application Device step?


  • Question 5

0 out of 1 points

____________ means; probability that the system fails to detect a match between the input pattern and a matching template in the database.

  • Question 6

1 out of 1 points

In 7 factors for biometric authentication, which one explain:
biometric features that remain constant over time

  • Question 7

1 out of 1 points

In 7 factors for biometric authentication, which one explain:
accuracy, speed and robustness of technology

  • Question 8

1 out of 1 points

What is the most common type of biometrics device in the enterprise?

  • Question 9

1 out of 1 points

Correspondingly, a higher threshold will reduce the ______ but increase the _______.

  • Question 10

1 out of 1 points

Which option is not a security violation for false acceptance?

  • Question 11

1 out of 1 points

Biometric authentication base on something you _____

  • Question 12

1 out of 1 points

A biometric modality that uses the cadence of an individual's typing pattern for recognition.

  • Question 13

0 out of 1 points

Which option is not biometric method thet you are?

  • Question 14

1 out of 1 points

It measures the percent of invalid inputs which are incorrectly accepted.

  • Question 15

0 out of 1 points

For checking message integrity, destination checks provided hash code from source with public key of source.

  • Question 16

0 out of 1 points

In certificate verification, Consumer must have a trusted copy of the subject’s public key. The consumer can then chain from his trusted copy of subject’s public key to a trusted copy of issuer’s public key.

  • Question 17

0 out of 1 points

Two messages can have same hash value.

  • Question 18

1 out of 1 points

In Digital Certificate, the plaintext contains of:
Issuer (CA)
Subject (user)
Subject (user) Public key
Expiration date

  • Question 19

1 out of 1 points

If the threshold is reduced, there will be fewer false false accepts but more non-matches.

  • Question 20

1 out of 1 points

In hash code, a small change in the input (message) drastically changes the output (digest).

  • Question 21

1 out of 1 points

The matching algorithm performs a decision based on a threshold which determines how close to a template the input needs to be for it to be considered a match.

  • Question 22

1 out of 1 points

The system will succeed in identifying the individual if the comparison of the sample to a template in the DB falls within a previously set ___________.

  • Question 23

1 out of 1 points

_________ means; when subject is trying to fool the system.

  • Question 24

1 out of 1 points

The other term for False Accept Rate is _____________.

  • Question 25

1 out of 1 points

For creating a digital signature, the process as follow:
Message --> Hash code --> encrypt hash code with Source private key

citation generator
citaion generator
make money online